Book review: Fancy Bear Goes Phishing, by Scott J Shapiro
![](https://booksontherise.com/wp-content/uploads/2022/10/British-Beat-Explosion-300x450.jpeg)
Fancy Bear Goes Phishing by Scott J. Shapiro - BOOKS on the RISE
![](https://m.media-amazon.com/images/I/41yi7hCi-bL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_PIStarRatingFOURANDHALF%2CBottomLeft%2C360%2C-6_SR600%2C315_ZA945%2C445%2C290%2C400%2C400%2CAmazonEmberBold%2C12%2C4%2C0%2C0%2C5_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency: 9780593315613: Greenberg, Andy: Books
![](https://www.pawshake.co.uk/blog/sites/default/files/2023-06//chung-nguyen-kjlk-jw2nli-unsplash.jpg)
Face ID Software for Bears, Latest Science News and Articles
Fancy Bear Goes Phishing - eMediaLibrary - OverDrive
![](https://m.media-amazon.com/images/I/41M9yGlOcKL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_PIStarRatingFOURANDHALF%2CBottomLeft%2C360%2C-6_SR600%2C315_ZA46%2C445%2C290%2C400%2C400%2CAmazonEmberBold%2C12%2C4%2C0%2C0%2C5_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Legality: 9780674725782: Shapiro, Scott J.: Books
![](https://bearresearch.org/wp-content/uploads/2018/06/IMG_7556.jpg)
Face ID Software for Bears, Latest Science News and Articles
Fan Zhang on LinkedIn: The moment when your university professor uses a DNV GL autonomous ship…
![](https://miro.medium.com/v2/resize:fit:679/1*ZG2Tqy7TxaUirqsGGCCuAQ.jpeg)
Face ID Software for Bears, Latest Science News and Articles
![](https://pbs.twimg.com/media/F9NllMkbIAEnQkb.jpg)
Cybersecurity Canon on X: Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro Read the #Cybersecurity Canon Book Review by Hal Gangnath
![](https://static01.nyt.com/images/2023/05/23/opinion/23shapio/23shapio-superJumbo.jpg)
Opinion This Is Why I Teach My Law Students How to Hack - The New York Times
![](https://cdn.nextbigideaclub.com/wp-content/uploads/2023/06/13142531/Fancy-Bear-Goes-Phishing_BBInLine_Solo.jpg)
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks